Code:
Operation : Identify [ v2.27 ]
Mode : META
1. Make sure device is powered off. Power off, if need. Wait 20 seconds after
2. Insert USB cable in phone
Waiting for device connection ...
PTFN : MediaTek USB Port (COM6)
MODE : BOOTROM
PORT : 6
Waiting BOOT ack ...
BROM : Skip ACK verify
BROM : Init BROM
BROM init passed!
CHIP : MT6768 , SBID : 0x8A00 , HWVR : 0xCA00 , SWVR : 0x0000
CODE : Talbot
TYPE : MODERN [RAPHAEL]
BROM : MEID : 96AC239B7D0FDD3FEC8CC9D02008C342
BROM : SecLevel : 0x000000E5
BROM : SecMode : SBC+SDA+EXT
BROM : BROM|BL : 0x05|0xFE
BROM : BOOTROM
BROM : SOCID : 3DE51D8C755282455CE6F6480F8609F7224CBEA72C29558F7DDBB42625B763A3
BROM : SLA : Local Auth
BROM : SLA : Auth Started!
BROM : SLA : Look for EMI
BROM : SLA : EMI found!
BROM : SLA : Auth Passed!
BROM : SLA : 0x0000001F
BROM : Configuring target for META
BROM : META configured!
INIT : META confirmed!
Boot done!
AP_CHIP : MT6768
AP_SWTM : Mon Nov 18 22:22:33 CST 2019
AP_SWVR : alps-mp-p0.mp3.tc19sp.sp2-V1.0.1_bbk.p0mp3.k68v1.64_P167
MD_CHIP : MT6768
MD_SWTM : 2000.00.00
MD_DSPV : 1.0
MD_DSPP : MOLY.LR12A.R3.TC19.PR1.SP.V1.P2
MD_SWVR : BBK_P0MP3_K68V1_64_BSP_HW
MD_HWVR : Unknown
Patch Level : PPR1.180610.011
Display ID : PPR1.180610.011 release-keys
Ver. CodeName : REL
Ver. Release : 9
Sec. Patch : 2019-11-05
Build Time : 18.11.2019
Product Model : vivo
Product Brand : vivo
Product Name : PD1934
Product Device : PD1934
Product Manfct : vivo
Product Info : k68v1_64
IMEI[1] : 8645740
IMEI[2] : 8645740
NVRAM : SEC NORMAL [ No extra security ]
NVRAM saved as : MT6768_1.0_MOLY.LR12A.R3.TC19.PR1.SP.V1.P2_BBK_P0MP3_K68V1_64_BSP_HW.bin
Done!
Elapsed: 00:01:14
Code:
Operation : Reset Settings/Format FS [ v2.27 ]
Mode : SMART RESET
1. Make sure device is powered off. Power off, if need. Wait 20 seconds after
2. Insert USB cable in phone
Waiting for device connection ...
PTFN : MediaTek USB Port (COM6)
MODE : BOOTROM
PORT : 6
Waiting BOOT ack ...
BROM : Skip ACK verify
BROM : Init BROM
BROM init passed!
CHIP : MT6768 , SBID : 0x8A00 , HWVR : 0xCA00 , SWVR : 0x0000
CODE : Talbot
TYPE : MODERN [RAPHAEL]
BROM : MEID : 96AC239B7D0FDD3FEC8CC9D02008C342
BROM : SecLevel : 0x000000E5
BROM : SecMode : SBC+SDA+EXT
BROM : BROM|BL : 0x05|0xFE
BROM : BOOTROM
BROM : SOCID : 3DE51D8C755282455CE6F6480F8609F7224CBEA72C29558F7DDBB42625B763A3
BROM : SLA : Local Auth
BROM : SLA : Auth Started!
BROM : SLA : Auth Passed!
BROM : SLA : 0x0000001F
AGENT : 0_base : BASE_v2112 | Manual : Disabled
AGENT : Look for suitable BootChain in DA ...
AGENT : MTK_AllInOne_DA.bin
AGENT : Found MT6768
AGENT : MTK_DOWNLOAD_AGENT
BROM : Sending 1st DA ...
BROM : DA sent
BROM :Transfer control to DA ...
DA : AGENT started!
DA : SYNC
DA : MODE : BROM
DA : EXT_RAM NOT initialized!
EMI : DEV : FireFly
EMI : SRC : preloa
EMI : CNT : 0009
EMI : Init EMI from INTERNAL DB
EMI : EXT_RAM CFG Passed!
DA : BOOT to 2nd DA ...
DA : 2ND stage confirmed!
DA : SYNC with DA passed!
DA : Receiving HW info
SRAM: 0x00070000 [ 448,00 KB ]
DRAM: 0x100000000 [ 4,00 GB ]
EMMC: CID : 90014A68444561503303235418B89693
EMMC: VEN : HYNIX : OEM : 74 : ID : 684445615033
EMMC: VEN : HYNIX : hDEaP3
EMMC: SNN : 592713912 ( 0x235418B8) , MF : 9/2019
EMMC:
BOOT1 : 0x00400000 [ 4,00 MB ]
BOOT2 : 0x00400000 [ 4,00 MB ]
RPMB : 0x01000000 [ 16,00 MB ]
USER : 0x1D1F000000 [ 116,48 GB ]
CHIP : MT6768 , SBID : 0x8A00 , HWVR : 0xCA00 , SWVR : 0x0001 , EVOL : 0x0000
RNID : 91117C825698E921A91ADB22E55C7AD2
DA : USB : HIGH-SPEED
Boot done!
SmartInfo : 0x815757
Format Ok : RESET PROTECTION
Format Ok : USERDATA
Format Ok : CACHE
Format Ok : USERDATA
Done!
Elapsed: 00:00:30
Reconnect Power/Cable!